Nowhere to Hide: The Government's Massive Intrusion Into Our Lives
Photo Credit: Shutterstock.com/Minerva Studio
Stay up to date with the latest headlines via email.
To stay on top of important articles like these, sign up to receive the latest updates from TomDispatch.com here.
For at least the last six years, government agents have been exploiting an AT&T database filled with the records of billions of American phone calls from as far back as 1987. The rationale behind this dragnet intrusion, codenamed Hemisphere, is to find suspicious links between people with “burner” phones (prepaid mobile phones easy to buy, use, and quickly dispose of), which are popular with drug dealers. The secret information gleaned from this relationship with the telecommunications giant has been used to convict Americans of various crimes, all without the defendants or the courts having any idea how the feds stumbled upon them in the first place. The program is so secret, so powerful, and so alarming that agents “are instructed to never refer to Hemisphere in any official document,” according to a recently released government PowerPoint slide.
You’re probably assuming that we’re talking about another blanket National Security Agency (NSA) surveillance program focused on the communications of innocent Americans, as revealed by the whistleblower Edward Snowden. We could be, but we’re not. We’re talking about a program of the Drug Enforcement Administration (DEA), a domestic law enforcement agency.
While in these last months the NSA has cast a long, dark shadow over American privacy, don’t for a second imagine that it’s the only government agency systematically and often secretly intruding on our lives. In fact, a remarkable traffic jam of local, state, and federal government authorities turn out to be exploiting technology to wriggle into the most intimate crevices of our lives, take notes, use them for their own purposes, or simply file them away for years on end.
"Technology in this world is moving faster than government or law can keep up," the CIA’s Chief Technology Officer Gus Hunt told a tech conference in March. "It's moving faster I would argue than you can keep up: You should be asking the question of what are your rights and who owns your data."
Hunt’s right. The American public and the legal system have been left in the dust when it comes to infringements and intrusions on privacy. In one way, however, he was undoubtedly being coy. After all, the government is an active, eager, and early adopter of intrusive technologies that make citizens’ lives transparent on demand.
Increasingly, the relationship between Americans and their government has come to resemble a one-way mirror dividing an interrogation room. Its operatives and agents can see us whenever they want, while we can never quite be sure if there’s someone on the other side of the glass watching and recording what we say or what we do -- and many within local, state, and federal government want to ensure that no one ever flicks on the light on their side of the glass.
So here’s a beginner’s guide to some of what’s happening on the other side of that mirror.
You Won’t Need a Warrant for That
Have no doubt: the Fourth Amendment is fast becoming an artifact of a paper-based world.
The core idea behind that amendment, which prohibits the government from “unreasonable searches and seizures,” is that its representatives only get to invade people’s private space -- their “persons, houses, papers, and effects” -- after it convinces a judge that they’re up to no good. The technological advances of the last few decades have, however, seriously undermined this core constitutional protection against overzealous government agents, because more and more people don’t store their private information in their homes or offices, but on company servers.